Data at Rest Encryption

Encrypt Data with BestCrypt

Data breaches are on the rise. Confidential information and personal records are getting leaked, lost and stolen – from threats both virtual and physical. On top of pains from unwanted access to sensitive information, penalties have become more severe and more frequent for non-compliance with regulations on financial, medical and personal data. All of these incidents now critically demand effective data protection solutions.

No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance.

Use Cases for Data at Rest Encryption

Physical theft – for data stored on lost or stolen computers, laptops and USB sticks

Prevent Unintended Data Leaks

Personally Identifiable Information (PII)

Electronic Health Records (EHR)

Credit card data

Insurance and financial records

Student information

Client records and customer databases

Proprietary information or trade secrets

Emails

Chat histories

Compliance with Regulations

Health Insurance Portability and Accountability Act (HIPAA)

Payment Card Industry Data Security Standard (PCI-DSS)

Sarbanes-Oxley Act (SOX)

Gramm-Leach-Bliley Act (GLBA)

European Union Directive on Data Privacy

UK Data Protection Act

How to Encrypt Data with BestCrypt

BestCrypt by Jetico delivers speed, flexibility and confidentiality for anyone concerned with protecting sensitive information – from IT experts at large organizations handling trade secrets to people at home concerned with personal privacy.

Encryption doesn’t have to hurt. To protect stored data, strong encryption with BestCrypt is easy to use and light on your system.

Use BestCrypt Container Encryption to store selected files and folders on an active computer, shared workstation or network storage.Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. Thanks to compatibility on different operating systems, BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS and Linux.

Encryption Algorithms

BestCrypt by Jetico utilizes strong encryption algorithms (AES, Blowfish, Twofish, CAST and others) – each implemented with the largest possible key size defined in the algorithm's specification. In addition to Cipher Block Chaining (CBC), BestCrypt comes built with XTS and LRW encryption modes, which are more secure than other common modes like CBC.

BestCrypt Container Encryption

BestCrypt Volume Encryption

Windows

Mac

Linux

AES (Rijndael)*

Blowfish

CAST

GOST 28147-89

Triple-Des

Serpent*

Twofish*

Utilize XTS*, LRW and CBC encryption mode - all with the largest possible key size

NOTE: BestCrypt is backward-compatible: containers and volumes created with any encryption algorithm and mode supported by old versions can be mounted by a newer version of the software.